Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication with permanent security from short-term secure encrypted quantum communication

A short-term security and quantum technology, applied in the field of quantum cryptography, can solve the problems that permanent security cannot be established, and achieve the effects of large encoder and receiver noise, high channel bit error rate, and large channel loss

Active Publication Date: 2020-12-18
INST MINES TELECOM
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security advantages of such schemes through computationally secure encryption, especially permanent security cannot be established
The method therefore exhibits limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication with permanent security from short-term secure encrypted quantum communication
  • Communication with permanent security from short-term secure encrypted quantum communication
  • Communication with permanent security from short-term secure encrypted quantum communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0065] According to an aspect of the invention, a "hybrid" security model (ie combining classical and quantum cryptography in a specific manner) is disclosed. Embodiments of the disclosed invention, for example, enable the establishment of secure two-party cryptographic primitives. Such progressions include, for example, bit commitments, coin tosses, or XOR calculations. Relatedly, such two-party cryptographic protocols can be used to establish any secure multi-party protocol.

[0066] Further, a classical message is long-term secure if the information accessible to any eavesdropper E about the message can be capped at an arbitrarily chosen amount close to zero, and if said bound always remains in effect.

[0067] Further, if the accessible information about any eavesdropper E of a message can be bounded by an arbitrarily chosen amount close to 0, and if this bound is valid during an interval of at least tau duration, then a classical message is at least tau The period is sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method (300) of communicating a classical message M between a first party A and a distant second party B over a common channel F, comprising the steps of: sharing (310) a secret key between said parties, so The shared key K includes a short-term security key KS and / or a long-term security key KL; at A, M is encoded as a quantum code word, and A utilizes K to encode M into a first encryption code belonging to a known quantum code ( 320); passing the first encrypted codeword from A to B via F output as the second codeword (330); by utilizing N-mode interference controlled by B, placed at the output of F, and keyed by K The instrument simply transforms the second codeword into a third codeword (340); at B, an estimate of M is determined (350) by performing measurements on the third codeword and by processing the measurements with K.

Description

technical field [0001] The invention relates to the field of quantum cryptography. Background technique [0002] The creation and distribution of keys is a prerequisite for encrypted communication. Quantum cryptography (QKD) can be used to generate and distribute keys, but not to transmit any information data. A distinct advantage of quantum cryptography over computationally secure key distribution techniques is the existence of quantum cryptography protocols whose security can be established formally in theoretical information settings. Even when some computational techniques are used for authentication purposes on classical channels, quantum cryptography can guarantee permanent security. [0003] For key establishment protocols, permanent security specifically means that once the protocol has been terminated and keys have been distributed, its security cannot be compromised at any time in the future, regardless of computing power, or any cryptographic effort by a potenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0844H04J14/0227H04L9/0858H04L2209/24
Inventor R·阿洛姆
Owner INST MINES TELECOM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products